Compliance Framework

SLSA v1.0 — software supply chain integrity.

Supply-chain Levels for Software Artifacts (SLSA) is a security framework for preventing tampering with software during build and release. MergeGuide addresses the source and build integrity requirements in SLSA v1.0 — enforcing code-level controls that protect against supply chain attacks at the source.

Why supply chain security starts in code

SLSA v1.0 defines four levels of supply chain security maturity. SLSA Level 1 requires build provenance — documentation of how software was produced. Level 2 adds hosted build platforms. Level 3 requires hardened builds with additional protections.

Before any of these build-level controls matter, the source code must be secure. Injecting malicious code into a dependency, committing secrets to repositories, or introducing vulnerabilities at the PR level can undermine even a fully SLSA Level 3 build pipeline. MergeGuide addresses supply chain risk at the source layer.

MergeGuide includes policies that guide implementation of SLSA source and software security requirements — detecting code patterns that create supply chain risk before they enter the build pipeline, with immutable evidence artifacts for provenance documentation.

SLSA source integrity coverage

MergeGuide templates cover key supply chain security requirements at the code level:

  • Source integrity: detecting unauthorized or suspicious code patterns before merge
  • Dependency hygiene: detecting unsafe dependency usage patterns in application code
  • Secret detection: detecting credentials that could enable supply chain compromise
  • Build configuration security: detecting insecure CI/CD script patterns
  • SBOM generation: generating CycloneDX 1.5 and SPDX 2.3 artifacts at build time
  • Immutable evidence: cryptographically signed artifacts proving code was validated pre-build

Supply chain detection patterns

Supply Chain Risk What MergeGuide Detects Severity
Credential compromiseHardcoded secrets, API keys, and credentials committed to source repositoriesCritical
Dependency confusionDependency references that could be susceptible to namespace confusion attacksHigh
Build script injectionUnsafe patterns in CI/CD scripts that could enable pipeline compromiseHigh
Malicious code patternsExfiltration patterns and unusual network calls in build-time codeCritical
Force push to protected branchesCI scripts attempting force pushes that could overwrite signed commitsHigh
Unsigned dependency usageDependency pinning practices that reduce provenance verifiabilityMedium
Insecure IaCInfrastructure-as-code patterns that reduce build environment integrityHigh
📦

SBOM generation

SLSA and supply chain security requirements increasingly demand Software Bill of Materials. MergeGuide generates CycloneDX 1.5 and SPDX 2.3 SBOMs at build time — providing the component inventory required for supply chain risk analysis and vulnerability tracking.

🔏

Immutable evidence artifacts

SLSA provenance requires tamper-evident records of how software was built. MergeGuide's signed evidence artifacts provide cryptographic proof that code was validated against security policies before entering the build pipeline — complementing build provenance documentation.

🔗

NIST SSDF alignment

SLSA and NIST SSDF share overlapping supply chain security requirements. MergeGuide's PolicyMerge resolves overlapping controls between SLSA, SSDF, and other active frameworks — a single assessment covers all supply chain requirements simultaneously.

Securing your software supply chain?

See how MergeGuide addresses SLSA source integrity requirements and generates provenance-supporting evidence artifacts in a live demo.

Book a demo Talk to sales